An instance of this new toolkit was observed during a ransomware incident targeting US companies in July 2024 and was composed of a loader and an EDR killer, namely MDeployer and MS4Killer, respectively, and was observed during a ransomware attack targeting US companies.
It appears that the tools were created together and that some of the functionality in the tools overlaps.
This report has revealed that the ransomware payloads of MDeployer, MS4Killer and Embargo were all made in Rust, which indicates that this language is the programming language that the group favours.
A double extortion method is used by the group – as well as encrypting the victims’ data and extorting data from them, they threaten to publish those data on a leak site, demonstrating their intention to leak their data.
Read the original article: